Eliciting and utilising knowledge for security event log analysis: an association rule mining and automated planning approach

Research output: Contribution to journalArticlepeer-review

22 Citations (Scopus)

Search results